Yongxin Feng

ORCID: 0000-0002-8632-7834
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Computational Techniques and Applications
  • Advanced Algorithms and Applications
  • GNSS positioning and interference
  • Energy Efficient Wireless Sensor Networks
  • Mobile Ad Hoc Networks
  • Advanced Sensor and Control Systems
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Wireless Communication Networks Research
  • Mobile Agent-Based Network Management
  • Advanced Wireless Communication Techniques
  • Inertial Sensor and Navigation
  • Wireless Signal Modulation Classification
  • Ionosphere and magnetosphere dynamics
  • Anomaly Detection Techniques and Applications
  • Chaos control and synchronization
  • Satellite Communication Systems
  • Aerosol Filtration and Electrostatic Precipitation
  • Opportunistic and Delay-Tolerant Networks
  • Industrial Gas Emission Control
  • Security in Wireless Sensor Networks
  • Simulation and Modeling Applications
  • Advanced Measurement and Detection Methods
  • Blind Source Separation Techniques
  • Radar Systems and Signal Processing

China North Industries Group Corporation (China)
2025

Shenyang Ligong University
2015-2024

China Tobacco
2021-2024

China Southern Power Grid (China)
2012-2023

Weatherford College
2023

Tianjin University of Technology and Education
2021

Tianjin University
2020

Collaborative Innovation Center of Chemical Science and Engineering Tianjin
2020

Chengdu University of Technology
2018

Power Grid Corporation (India)
2012

In industrial wireless sensor networks, an energy-efficient quality-of-service (QoS) routing algorithm is very important to ensure that the key sensing data can be forwarded in a reliable path and solve energy balance problem. this paper, we classify into three types set their priority. Furthermore, give reliability parameters timeliness parameters, propose establish candidate forwarding node order consumption. Subsequently, QoS aware designed, algorithm, different kinds of with strategies....

10.1109/access.2018.2866165 article EN cc-by-nc-nd IEEE Access 2018-01-01

3D topology control in underwater sensor networks is of great significance to ensuring reliable and efficient operation the network. In this paper, by analyzing characteristics an network, we take cube as basic unit perform partition monitoring area, define cluster structure arrange rotating temporary nodes cluster. Then, a sleep-wake scheduling algorithm proposed that compares remaining node energy. It selects with largest energy working node, complete transition dormancy waiting states...

10.3390/s19010156 article EN cc-by Sensors 2019-01-04

Today, with the continuous promotion and development of IoT 5G technology, Cyberspace has become an important pillar economic social development, also a foundational domain national security. security is attracting more attention. Therefore, detecting malware its variants great significance to Cyberspace. However, increasing sophistication malicious variants, such as encryption, polymorphism obfuscation, makes it difficult identified effectively. In this article, detection method code...

10.1109/access.2020.3022722 article EN cc-by IEEE Access 2020-01-01

The continuously increasing number of connected smart devices has led to the emergence a crucial fault detection challenge Internet Things (IoT). In this study, we aim identify method for effective faults in IoT devices. An network model is first established, and data edge verification mechanism based on blockchain proposed; used ensure that cannot be tampered with, their accuracy verified using edge. Finally, set weighted random forest particle swarm optimization proposed. simulation...

10.1109/jiot.2020.3044934 article EN IEEE Internet of Things Journal 2020-12-15

Due to the harsh deployment environment of underwater coustic sensor networks (UASNs), a reliable and energy-saving routing algorithm has always been an important challenge hot topic. A Nonuniform clustering (NC) is designed first in which clusters are generated according different node densities. Based on NC, backbone acoustic network formed UASNs. To guarantee reliability data transmission network, NC based virtual gravitational potential field (NC_RVGPF) proposed. This algorithm: 1)...

10.1109/jiot.2023.3263174 article EN IEEE Internet of Things Journal 2023-03-30

Knowledge graphs in the field of network security can integrate diverse, heterogeneous, and fragmented data, further explore relationships between provide support for deep analysis. Currently, there is sparse information knowledge graphs. The limited provided by traditional text encoding models leads to insufficient reasoning ability, greatly restricting development this field. Starting from encoding, paper first addresses issue inadequate capabilities using a learning model assistance. It...

10.3390/electronics13091661 article EN Electronics 2024-04-25

The Industrial Wireless Rechargeable Sensor Network (IWRSN) is a sensor network used in industrial environments. In order to ensure certain intensity of monitoring and real-time control, the equipped with mobile charger supplement energy for sensors according charging schedule. Because complexity environment, area firstly divided into grids established set paths that can be driven by chargers. On this basis, newborn particle swarm optimization (NPSO) scheduling algorithm proposed constraint...

10.1109/jsen.2020.2994113 article EN IEEE Sensors Journal 2020-05-12

Abstract Jurassic sandstones in the Xiongcun porphyry copper–gold district, southern Lhasa subterrane, Tibet, China were analysed for petrography, major oxides and trace elements, as well detrital zircon U–Pb Hf isotopes, to infer their depositional age, provenance, intensity of source-rock palaeo-weathering tectonic setting. This new information provides important evidence constrain evolution subterrane during Late Triassic – period. The are exposed lower upper sections Formation. Their...

10.1017/s0016756818000122 article EN Geological Magazine 2018-04-18

With explosive growth of malware, Internet users face enormous threats from Cyberspace, known as “fifth dimensional space.” Meanwhile, the continuous sophisticated metamorphism malware such polymorphism and obfuscation makes it more difficult to detect malicious behavior. In paper, based on dynamic feature analysis a novel extraction method hybrid gram (H-gram) with cross entropy overlapping subsequences is proposed, which implements semantic segmentation sequence API calls or instructions....

10.1155/2019/2674684 article EN Security and Communication Networks 2019-02-04

The increasing sophistication of malware variants such as encryption, polymorphism, and obfuscation calls for the new detection classification technology. In this paper, MalDeep, a novel framework deep learning based on texture visualization, is proposed against malicious variants. Through code mapping, partitioning, extracting, we can study in feature space image representation without decryption disassembly. Furthermore, built classifier convolutional neural network with two layers,...

10.1155/2019/4895984 article EN Security and Communication Networks 2019-04-01

The application-layer distributed denial of service (AL-DDoS) attack makes a great threat against cyberspace security. detection is an important part the security protection, which provides effective support for defense system through rapid and accurate identification attacks. According to attacker’s different URL Web service, AL-DDoS divided into three categories, including random fixed traverse one. In order realize attacks, mapping matrix joint entropy vector constructed. By defining...

10.1155/2018/9463653 article EN cc-by Security and Communication Networks 2018-01-01

The influences of operating conditions, such as excess air ratio and SOFA arrangement, on temperature distributions, species NOx emissions burnout a tangentially-fired utility boiler using bituminous blended coal were investigated by numerical approach in the present study. simulation results show that fuel type exhibits certain effect distributions emissions. Moreover, higher could restrain CO formation but promote emission. are highly related to arrangement. In addition, technology is...

10.1016/j.egypro.2017.03.846 article EN Energy Procedia 2017-05-01

The white-headed langur survives in just four karst forest fragments China: one the Longgang National Nature Reserve on border of counties Longzhou and Ningming (NS habitat); a second Chongzuo Banli Provincial Reserve, County (CZ two Fusui Papen Fushui (F1 habitat F2 habitat), all southwest Guangxi Province. population is fewer than 700. We used GIS Mapinfo Professional 7.0 Arcview 3.2 to study landscape features (forest fragmentation patchiness natural formations those resulting from or...

10.1896/052.023.0116 article EN Primate Conservation 2008-11-01

Study on the fault diagnosis method through combination of decision classification algorithms and expert system. The extracting rules with CTree software was given, a system based CLIPS developed. In order to verify feasibility method, at first sample data got simulations under direct-drive wind turbine gearbox, then extracted software, last proposed used diagnose simulated. Test results showed that misdiagnosis rate both within 5%, thus verified. DOI: http://dx.doi.org/10.11591/telkomnika.v10i5.1281

10.11591/telkomnika.v10i5.1281 article EN TELKOMNIKA Indonesian Journal of Electrical Engineering 2012-09-03

With the broadband, noise-like, and non-periodic characteristics of chaotic signals, digital modulation schemes have received extensive attention. A new short reference orthogonal double bit rate differential shift keying (SR-ODBR-DCSK) communication scheme is proposed in paper. The technology generates two signals by using orthogonality acting on Walsh function modulates continuous two-bit data information respectively to achieve simultaneous transmission at same time slot. Odd bits even...

10.3390/electronics11132020 article EN Electronics 2022-06-27
Coming Soon ...